CVE-2023-26411

7.8 HIGH

📋 TL;DR

Adobe Substance 3D Designer versions 12.4.0 and earlier contain an out-of-bounds read vulnerability when parsing malicious files. An attacker could exploit this to execute arbitrary code with the privileges of the current user. This affects users who open untrusted files with vulnerable versions of the software.

💻 Affected Systems

Products:
  • Adobe Substance 3D Designer
Versions: 12.4.0 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable when parsing files; no special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via remote code execution with user privileges, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Local privilege escalation or arbitrary code execution when a user opens a malicious file, potentially compromising the workstation.

🟢

If Mitigated

Limited impact with proper user training and file restrictions, though successful exploitation still yields user-level access.

🌐 Internet-Facing: LOW - Exploitation requires user interaction to open a malicious file; not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared malicious files, leading to workstation compromise.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening a malicious file) and crafting a file to trigger the out-of-bounds read, but no public exploit code is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.4.1 or later

Vendor Advisory: https://helpx.adobe.com/security/products/substance3d_designer/apsb23-28.html

Restart Required: Yes

Instructions:

1. Open Adobe Substance 3D Designer. 2. Go to Help > Check for Updates. 3. Follow prompts to install version 12.4.1 or newer. 4. Restart the application.

🔧 Temporary Workarounds

Restrict File Opening

all

Prevent users from opening untrusted .sbs or other Substance Designer files from unknown sources.

Use Application Whitelisting

windows

Configure application control policies to allow only trusted versions or block execution of vulnerable versions.

🧯 If You Can't Patch

  • Discontinue use of Adobe Substance 3D Designer until patched, using alternative software if possible.
  • Implement strict user training to avoid opening files from untrusted sources and monitor for suspicious file activity.

🔍 How to Verify

Check if Vulnerable:

Check the installed version in Adobe Substance 3D Designer under Help > About. If version is 12.4.0 or earlier, it is vulnerable.

Check Version:

On Windows: Check via installed programs in Control Panel or run 'wmic product where name="Adobe Substance 3D Designer" get version'. On macOS: Check via Applications folder or use terminal commands specific to app version.

Verify Fix Applied:

After updating, verify the version is 12.4.1 or later in Help > About.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes or unexpected terminations of Adobe Substance 3D Designer when opening files
  • Security logs showing execution of suspicious processes from the application directory

Network Indicators:

  • Unusual outbound connections from the application post-file opening, though not typical for this vulnerability

SIEM Query:

Example: event_id=4688 AND process_name="Substance Designer.exe" AND parent_process_name="explorer.exe" AND command_line CONTAINS ".sbs"

🔗 References

📤 Share & Export